z13_train_wheel-2 z13_worker-2 z13_valve-2 z13_emergency_vehicle-2 z13_radar-2 z13_electric_tower-2
logo-psi

Product Source International Datacomm
Premier Distributor of DZS products

201.488.6000

linkedin
z13_tornado-1a

video

FTTx

fttx-znid-gpon-4111-front-med

Fiber Optic

PFS-SPLICER-500

Cyber
Security

ss-610261073-key-02

Disaggregated
Networking

img-virtual-network-1

Legacy TDM

AM3440-CHPAa-8GEHSWa-w8h6-1
HOME ->  Manufacturers ->  Certes

 

 

MFG

 

logo-psi

logo-certes-blue-grayCERTES NETWORKS PROVABLE SECURITY®


 

Overview

Securing your critical data across the network

Certes’ approach to information assurance enables customers to secure data in transit in a way that is completely independent of the underlying network infrastructure.  Certes Layer-4 encryption solution decouples security from network hardware.  In this way, you and your team can be confident that your data is assured, regardless of what is going on in the network.

The Certes solution enables secure encryption of only the data (payload) enabling transparent deployment that operates independently with zero changes to routers, switches and firewalls. Network visibility and operational functionality are fully maintained with minimal complexity and minimal impact on latency.

This allows you to:

  1. Define intent-based policies for each category of data.

    Policies can be defined to encrypt sensitive data such as GDPR but allow public-facing traffic to pass in the clear. Policies can also be created to drop traffic entirely if desired in an automated manner.
     
  2. Segment your network by separating data flows, applications and work flows.

    By applying unique encryption keys to each data flow, you can logically segment your most sensitive data from everything else and prevent any risk of lateral movement in the event a bad actor accesses your network.
     
  3. Maintain network visibility while data in transit is being encrypted.

    While standard security products blind networks and make negatively impact network analytic tools, Certes Layer 4 solutions protect sensitive data while ensuring that network visibility is maintained
     
  4. Prove that Security Policies are working with Observability.
    Our solutions can help you prove that your security policies are being enforced and their security strategy is working with Certes Observability tool.


    If a security policy is not being enforced for some reason or if suspicious behavior is going on, your teams can identify this early on. Our Observability tool integrates with all of your existing SIEM and AI tools allowing you to automatically drop traffic if certain circumstances exist. This also enables you to produce very granular reports to your insurers and other auditors to give them certain assurances without creating hours/days of work for your team.

 

Certes-CEP420-front-hires Certes-CEP420-front-hires
logo-psi

We sell and support
DZS products and solutions

Please contact PSI at
 201.488.6000
for a quote

All logos, brand, product, service, and process names are trademarks or service marks of their respective holders and are protected by U.S. and international copyright laws and treaty provisions. All trademarks and registered trademarks are the sole property of their respective holders. All photographs are courtesy of respective manufacturers. All specifications, products, product names, schedules, content and prices are subject to change without notice. No warranty is made as to technical accuracy. No warranty is made with respect to the merchantability of any product, service or solution or the fitness of any product, service or solution for any particular purpose or use. Nothing contained herein shall be construed as conferring any license or right under any copyright, trademark, patent or other intellectual property rights.241105-1744